Results 11 to 20 of about 1,916,317 (370)

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj   +3 more sources

Understanding Computer Security [PDF]

open access: yesFrontiers in ICT, 2014
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Nicola Zannone   +2 more
core   +14 more sources

COMPUTER SECURITY [PDF]

open access: yesHUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire   +5 more sources

Computer Security: Competing Concepts [PDF]

open access: greenarXiv, 2001
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
Helen Nissenbaum   +2 more
arxiv   +3 more sources

Computer Security

open access: goldCalifornian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex   +3 more sources

Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]

open access: yesComputer Science Journal of Moldova, 2022
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea   +2 more
doaj   +1 more source

Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda

open access: yesJournal of Innovation Information Technology and Application, 2022
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe   +2 more
doaj   +1 more source

Verifiable image revision from chameleon hashes

open access: yesCybersecurity, 2021
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu   +4 more
doaj   +1 more source

Demystifying Blockchain Technology for Resource-Constrained IoT Devices: Parameters, Challenges and Future Perspective

open access: yesIEEE Access, 2021
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability ...
Inna Romashkova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy